Posts

Showing posts from April, 2018

http://uproonlin.ecom/index.php/UJCT

You can directly mail your paper at ujct@uproonline.com, editorujct@gmail.com. http://uproonlin.ecom/index.php/UJCT

http://uproonline.com/index.php/UJCT

Impact Factor 0.875, Universal Journal of Computers & Technology (UJCT) is an International, open access, peer reviewed, online journal. The journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific preeminence in all areas of theoretical, experimental and applied UJCT. http://uproonline.com/index.php/UJCT

UNIVERSAL JOURNAL OF COMPUTERS & TECHNOLOGY (UJCT)

  UNIVERSAL JOURNAL OF COMPUTERS & TECHNOLOGY (UJCT) ISSN: 2456-2955 IMPACT FACTOR: 0.875 ,   Indexed with  Google Scholar , Scribd,  Research Bib ,  Scientific Indexing Services (SIS) , Directory of Research Journals  Indexing, Research Gate, Cosmos, Root Indexing, Citefactor ESJI Index Journal, Science Library Index & many more. You can directly mail your paper at   ujct@uproonline.com ,  editor ujct@gmail.com .  Website: http://uproonlin . ecom/index.ph p/UJCT Email Id: ujct@uproonline.com ,  editorujc t@gmail.com Register Online: http://uproonline.com/index.ph p/UJCT/user/register Paper template can be downloaded from  this link The advantages to you of publishing in UJCT •       Full open access: everyone can read your article when it is published •       Prompt and fair peer review from two or more expert peer r...

UJCT

  UNIVERSAL JOURNAL OF COMPUTERS & TECHNOLOGY (UJCT) ISSN: 2456-2955 IMPACT FACTOR: 0.875 ,   Indexed with  Google Scholar , Scribd,  Research Bib ,  Scientific Indexing Services (SIS) , Directory of Research Journals  Indexing, Research Gate, Cosmos, Root Indexing, Citefactor ESJI Index Journal, Science Library Index & many more. You can directly mail your paper at   ujct@uproonline.com ,  editor ujct@gmail.com .  Website: http://uproonlin . ecom/index.ph p/UJCT Email Id: ujct@uproonline.com ,  editorujc t@gmail.com Register Online: http://uproonline.com/index.ph p/UJCT/user/register Paper template can be downloaded from  this link The advantages to you of publishing in UJCT •       Full open access: everyone can read your article when it is published •       Prompt and fair peer review from two or more expert peer r...
  UNIVERSAL JOURNAL OF COMPUTERS & TECHNOLOGY (UJCT) ISSN: 2456-2955 IMPACT FACTOR: 0.675 ,   Indexed with  Google Scholar , Scribd,  Research Bib ,  Scientific Indexing Services (SIS) , Directory of Research Journals  Indexing, Research Gate, Cosmos, Root Indexing, Citefactor ESJI Index Journal, Science Library Index & many more. You can directly mail your paper at   ujct@uproonline.com ,  editor ujct@gmail.com .  Your Paper will be published through double peer review process within a weak and same day your paper will be available on Google Scholar. Website: http://uproonline.com/index.ph p/UJCT Email Id: ujct@uproonline.com ,  editorujc t@gmail.com Register Online: http://uproonline.com/index.ph p/UJCT/user/register Paper template can be downloaded from  this link The advantages to you of publishing in UJCT •       Full open access...

http://uproonline.com/index.php/UJCT

Want to submit an article?   Please find all necessary information here:   Author Guidelines http://uproonline.com/index.php/UJCT

2456-2955

UNIVERSAL JOURNAL OF COMPUTERS & TECHNOLOGY (UJCT) ISSN: 2456-2955 You can directly mail your paper at ujct@uproonline.com, editorujct@gmail.com. Website: http://uproonline.com/index.php/UJCT Register Online: http://uproonline.com/index.php/UJCT/user/register -- Best Regards, Universal Journal of Computers & Technology ujct@uproonline.com, editorujct@gmail.com http://uproonline.com/index.php/UJCT/index

http://uproonline.com/index.php/UJCT

http://uproonline.com/index.php/UJCT

UJCT

UNIVERSAL JOURNAL OF COMPUTERS & TECHNOLOGY (UJCT)   i s an International open access, peer reviewed, online journal that communicates current, originative research   in the areas of Computers &Technology field. Impact Factor 0.675,  Universal Journal of Computers & Technology (UJCT) is an International, open access, peer reviewed, online journal. The journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific preeminence in all areas of theoretical, experimental and applied UJCT. Indexed with  Google Scholar , Scribd,  Research Bib ,  Scientific Indexing Services (SIS) , Directory of Research Journals  Indexing, Research Gate, Cosmos, Root Indexing, Citefactor ESJI Index Journal, Science Library Index & many more. We invite you to submit your manuscript(s) for publication. Our objective is to inform authors of the decision on their manuscript(s) w...

Join as Reviewer

  UNIVERSAL JOURNAL OF COMPUTERS & TECHNOLOGY (UJCT) ISSN: 2456-2955 ,  IMPACT FACTOR: 0.675 You are warmly welcome to join as Reviewer in  Universal Journal of Computers & Technology  (UJCT). You can directly e-mail your CV at  ujct@uproonline.com ,  editor ujct@gmail.com  to join as Reviewer in UJCT. or You can directly e-mail your papers at  ujct@uproonline.com ,  editor ujct@gmail.com . UJCT is indexed with Google Scholar, Worldcat, Exactseek, Scribd, Research Gate, Advanced Sciences Indexed, Yahoo, Research Bible, BibSonomy,   Directory of Research Journals Indexing   & many more. -- Best  Regards, Universal Journal of Computers & Technology ujct@uproonline.com ,  editorujc t@gmail.com http://uproonline.com/index.ph p/UJCT/index

[UJCT] Join as Reviewer

UNIVERSAL JOURNAL OF COMPUTERS & TECHNOLOGY (UJCT) ISSN: 2456-2955, IMPACT FACTOR: 0.675 You are warmly welcome to join as Reviewer in Universal Journal of Computers & Technology (UJCT). You can directly e-mail your CV at ujct@uproonline.com, editorujct@gmail.com to join as Reviewer in UJCT. or You can directly e-mail your papers at ujct@uproonline.com, editorujct@gmail.com. UJCT is indexed with Google Scholar, Worldcat, Exactseek, Scribd, Research Gate, Advanced Sciences Indexed, Yahoo, Research Bible, BibSonomy, Directory of Research Journals Indexing & many more. -- Best Regards, Universal Journal of Computers & Technology ujct@uproonline.com, editorujct@gmail.com http://uproonline.com/index.php/UJCT/index

Submission Method

Method: 1 (Recommended): You may easily submit paper via UJCT online submission by using this link: Register. Method: 2 (Alternate): You can directly mail your paper at ujct@uproonline.com, editorujct@gmail.com. http://uproonline.com/index.php/UJCT

Evaluation of academic institutional Websites: A Case Study of Saudi University Websites

Evaluation of academic institutional Websites: A Case Study of Saudi University Websites Sahar A. El_Rahman Abstract Website is a software product used by different organizations for marketing and information exchange. It is one of the best technologies for information system applications.  Generally, universities have complex websites, which include a collection of many sub-websites related to the different sections of universities. This work employed software tools-based evaluation method and evaluator-based evaluation method to comprehensively evaluate five big university websites in Saudi Arabia that are King Saud University (KSU), King Faisal University (KFU), Princess Nourah Bint Abdulrahman University (PNU), Prince Sultan University (PSU) and Dar Al Uloom University (DAU). The evaluation involves testing sample pages related to the selected universities. This study provides an overview regarding the weakness and strengths of the five Saudi university websites. W...

Scalable Unsupervised Ensemble Algorithm For Effective Insider Threat Detection

Scalable Unsupervised Ensemble Algorithm For Effective Insider Threat Detection Ajayi Adebowale, Ajayi Olutayo, Idowu Sunday, Ogbonna A.C, Otusile Oluwabukola Abstract Insider threats remain one of the oldest and notorious threats to information security. Early detection remains key to preventing insider attacks on an information system. The vast amount of enterprise data and the little data points pertaining to insider threats calls for techniques to handle the rare class problem. This study conceptualised insider threat data as a streaming data problem.  Scalability of insider threat detection systems represents a gap in knowledge in this disposition. Building on existing unsupervised ensemble stream mining techniques, this study proposed an insider threat detection algorithm and evaluated it using Centre for Analysis of Internet Data (CAIDA) Anonymized trace dataset for 2015. CAIDA datasets was used to ascertain the scalability of quantised dictionary construction...

MODELLING SCREW PROPELLER CHARACTERISTICS FOR OPTIMAL PERFORMANCE

MODELLING SCREW PROPELLER CHARACTERISTICS FOR OPTIMAL PERFORMANCE Adumene Sidum, Ombor Pereowei Garrick Abstract For the screw propeller to operate optimally there is the need to model the propeller characteristics using its hydrodynamic parameters. This work entails the use of MATLAB to model the performance characteristics of the propeller taking into consideration the propeller design equations with reference to the methodical series. The performance analysis was done with a four (4) bladed propeller with varying blade area ratio (expanded area ratio) of 0.4, 0.55, 0.70, 0.85 and 1.00. The performance (including cavitation criteria effects) of the largest possible optimal diameter was evaluated. The results show reasonable values of diameter for all the BAR’s except for expanded area ratio of 0.4 where a value of 8.75m larger than the draft was obtained and thus unacceptable. A table of propeller hydrodynamic values (diameter, open water efficiency, area and area ratios...

Secure authentication using the skin tone detection with the help of Advanced Encryption Standard and Steganography

Secure authentication using the skin tone detection with the help of Advanced Encryption Standard and Steganography Ekta Chauhan Abstract Filtering  of image content, compressing the content aware image and video applications of color balancing can advantage from automatic skin detection in the images. Biometric characteristic used for usage skin tone images region steganography. Here significant information is implanted within the skin image region which will provide an outstanding data hiding secure location. For this detection of skin tone is required to be performed. Various information hiding steps can be used through image cropping. Image cropping better security than information hiding without cropping the complete image, so works of crop region as a key at decoding region. AES cryptography algorithm is used to convert secret data into an unreadable form previously embedding; which gives a strong backbone for information security. Steganography is the hiding ski...

Effective Team Formation in A Multi-Cultural Information Technology Project Environment; the challenges and Solutions

Effective Team Formation in A Multi-Cultural Information Technology Project Environment; the challenges and Solutions AJAYI S. Wumi Abstract A major concern while handling multi-cultural projects in Information Technology (IT) organization is the large number of differences that exist amongst team members. These differences exist in various forms such as diversity in languages, orientations, educational background, sex, personal beliefs and cultural or ethnical differences.  Since most projects in IT organizations are scheduled to be undertaking within a time boundary and sometimes with constrained budgets by these same mixture of experts (irrespective of their differences) then, there is need to promote unison, empathy, professionalism, equity and sense of belonging amongst them to enable them (team members) overlook their individual and collective differences while functioning in their respective tasks to achieve management desired goals of time and quality. Otherwis...

Automatic Intelligent Real-time Intrusion Detection System: A Data Mining Model

Automatic Intelligent Real-time Intrusion Detection System: A Data Mining Model Oriola Oluwafemi Abstract Intrusion Detection System (IDS) is a popular device for securing network resources. However, developing a system that will automatically detect all known and unknown network attacks accurately in real-time is still a serious challenge. In this paper, a data mining model of an automatic intelligent real time network intrusion detection system that will be able to detect malicious network packets with very minimal false positive and false negative was presented. A three-layered Intrusion Detection System was modelled using Clustering techniques, Artificial Neural Networks and Decision Tree Classifiers. The algorithms used for each stage of the process were compared. Simple K-Means and Expectation Maximization Algorithms are compared in Layer One. In Layer Two, Multilayer Perceptron and Radial Basis Function Feed-Forward Back Propagation Neural Networks with varying para...

Synthesis of 2-oxoazetidine derivatives of 2-amino-5- methyl-thiazole and their antimicrobial activity

Synthesis of 2-oxoazetidine derivatives of 2-amino-5- methyl-thiazole and their antimicrobial activity Dr. Surendra Sonwane, Kanchan Kahar, Dr.Surendra Sonwane Abstract A new series of 3-chloro-4-(substituted phenyl)-1-{[2-(4-methyl-2-aminothiazolyl)-ethyl]-amino}-2-azetidinones, compounds  4a–j, has been synthesized from 2-amino-4-methyl-thiazole as the starting material. The structures of all the synthesized compounds were confirmed by chemical methodology and spectral analyses, such as FT-IR,  1 H-NMR, 13 C-NMR and mass spectroscopy. All the final synthesized compounds 4a–j  were screened for their antibacterial and antifungal activities against some selected bacteria and fungi and for their anti-tubercular activity against Mycobacterium tuberculosis, and  their minimum inhibitory concentration (MIC) values were determined. The anti-inflammatory activities of the title compounds were screened using albino rats (either sex) and gave acceptable results....

Mobile Number Portability (MNP) in Nigeria

Mobile Number Portability (MNP) in Nigeria Ominike Akpovi A. Abstract The Nigerian Communications Commission (NCC) introduced Mobile Number Portability (MNP) to allow subscribers switch between Mobile Network Operators (MNO) while retaining their mobile numbers. This paper gives an overview of MNP, the types and benefits and briefly discusses the Nigerian telecommunications landscape. Drawing on a sample of 80 mobile subscribers in Nigeria, this research work investigates the effect of mobile number portability (MNP) focusing on subscribers’ perception and reasons for switching operators and opinion about the MNP process. Findings suggest that expectation of improved Quality of Service (QoS), improved customer service and more competitive tariffs were key reasons of porting among subscribers. Keywords Mobile Number Portability (MNP); Mobile Network Operator (MNO); Quality of Service (QoS); Nigerian Communications Commission (NCC); Full Text: PDF